Author of the publication

An Intelligent Handoff System for Wireless Cellular Networks UsingFuzzy Logic and Random Walk Model.

, , , , and . CISIS, page 5-11. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MANET-viewer: a visualization system for mobile ad-hoc networks., , and . MoMM, page 452-457. ACM, (2009)Performance Evaluation of WMNs by WMN-PSOSA System Considering Chi-square and Exponential Client Distributions., , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 397-406. Springer, (2019)M3PS: a multi-platform P2P system based on JXTA and Java.. PPPJ, volume 178 of ACM International Conference Proceeding Series, page 224-229. ACM, (2006)BIAM: a new bio-inspired analysis methodology for digital ecosystems based on a scale-free architecture., , , and . Soft Comput., 23 (4): 1133-1150 (2019)Performance Evaluation of WMNs for Normal and Uniform Distribution of Mesh Clients Using WMN-PSOSA Simulation System., , and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, page 103-115. Springer, (2018)Apache Mahout's k-Means vs Fuzzy k-Means Performance Evaluation., , , and . INCoS, page 110-116. IEEE, (2016)A Hybrid Simulation System Based on Particle Swarm Optimization and Distributed Genetic Algorithm for WMNs: Performance Evaluation Considering Normal and Uniform Distribution of Mesh Clients., , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 42-55. Springer, (2018)A Recovery Method for Reducing Storage Usage Considering Different Thresholds in VANETs., , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 793-802. Springer, (2018)Secure Ubiquitous Health Monitoring System., , and . NBiS, volume 5186 of Lecture Notes in Computer Science, page 273-282. Springer, (2008)Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks., , , , and . NBiS, volume 5186 of Lecture Notes in Computer Science, page 111-121. Springer, (2008)